09-09-2014
I think any certificate will work, technically. It depends on the mail client if it accepts it. Usually the client will prompt the user with a 'do you accept?'.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi. One of my company's customers requires mails to be sent to them to use TLS. Thanks to some good documentation on the web, I've got this mostly figured out, but now I'm stuck at generating the CSR.
My company's mail domain is sg.bunny.com (not real address, obviously), but the email gateway... (0 Replies)
Discussion started by: pierreery
0 Replies
2. Solaris
Hello guys,
I have been trying to set up my DSEE 6.3 on Solaris 10 using proxy with tls:simple authentication. I follow all the steps mentioned in the Installation Guide on Sun's site but there is a problem with ldapclient init when I use hostname instead of IP address in the Default Server... (12 Replies)
Discussion started by: niyazi
12 Replies
3. Cybersecurity
Hey Guys,
I have a couple servers that are getting flagged by by our network security team. How do I disable TLS 1.0 protocol within Solaris? The vulnerability is :
CVE-2011-3389
TLS-SSL Server Blockwise Chosen-Boundary Browser Weakness (2 Replies)
Discussion started by: s ladd
2 Replies
4. UNIX for Advanced & Expert Users
Hello to all,
I'm beguinner in Linux instalations and I'm trying to Communicate from Web Sites that i have running under apache with openLDAP for users authentication using SSL mediation that seems to be connected with LDAPS.
Can someone advise me how to do this, I have already installed... (1 Reply)
Discussion started by: CPMarco
1 Replies
5. UNIX for Advanced & Expert Users
Here are the essentials:
un: myuser
pw: mypasswd
site: sftp.somesite.com
port: 990
type: FTPS
enc: FTP over implicit TLS
program used:
Curl 7.1.x on Hpux 11.31
I would like to "put" 1 file on there server.
Here is my syntax, what am I doing wrong?
curl -3 -v --cacert... (4 Replies)
Discussion started by: olyanderson
4 Replies
6. UNIX for Dummies Questions & Answers
Greetings.
I desperately need help to get my sendmail configuration working again.
I followed this guide:
Unmemorable Memories » Blog Archive » Enabling SMTP-AUTH for Sendmail on Debian Linux 3.1
to enable TLS and AUTH in sendmail and now I get an error I just cannot find any information... (1 Reply)
Discussion started by: Mr.Glaurung
1 Replies
7. AIX
The situation
Version AIX7.1/8.14.4
Compiled with: DNSMAP LDAPMAP LDAP_REFERRALS LOG MAP_REGEX MATCHGECOS
MILTER MIME7TO8 MIME8TO7 NAMED_BIND NDBM NETINET NETINET6
NETUNIX NEWDB NIS NISPLUS PIPELINING SCANF STARTTLS USERDB
USE_LDAP_INIT XDEBUG... (2 Replies)
Discussion started by: Linusolaradm1
2 Replies
8. UNIX for Advanced & Expert Users
:rolleyes:I am trying to setup all certificate based client-server environment in Linux using vsftpd and curl with openssl.
I would like to make a user access with vsftpd certificate and user own client certificate (self-signed) with private/public key.
I don't see google posts about the my plan... (4 Replies)
Discussion started by: gogogo
4 Replies
9. Solaris
We are implementing CUPS on a new Solaris 11.3 system. The same system will run an application where users can print to networked printers inside our organisation, or to a printer outside of our organisation over the internet.
For users printing to internal network printers, no encryption is... (0 Replies)
Discussion started by: SallyB
0 Replies
LEARN ABOUT CENTOS
ne_ssl_clicert_read
NE_SSL_CLIENT_CERT(3) neon API reference NE_SSL_CLIENT_CERT(3)
NAME
ne_ssl_clicert_read, ne_ssl_clicert_name, ne_ssl_clicert_encrypted, ne_ssl_clicert_decrypt, ne_ssl_clicert_owner, ne_ssl_clicert_free - SSL
client certificate handling
SYNOPSIS
#include <ne_ssl.h>
ne_ssl_client_cert *ne_ssl_clicert_read(const char *filename);
const char *ne_ssl_clicert_name(const ne_ssl_client_cert *ccert);
int ne_ssl_clicert_encrypted(const ne_ssl_client_cert *ccert);
int ne_ssl_clicert_decrypt(ne_ssl_client_cert *ccert, const char *password);
const ne_ssl_certificate *ne_ssl_clicert_owner(const ne_ssl_client_cert *ccert);
void ne_ssl_clicert_free(ne_ssl_client_cert *ccert);
DESCRIPTION
The ne_ssl_clicert_read function reads a client certificate from a PKCS#12-formatted file, and returns an ne_ssl_client_cert object. If the
client certificate is encrypted, it must be decrypted before it is used. An ne_ssl_client_cert object holds a client certificate and the
associated private key, not just a certificate; the term "client certificate" will used to refer to this pair.
A client certificate can be in one of two states: encrypted or decrypted. The ne_ssl_clicert_encrypted function will return non-zero if the
client certificate is in the encrypted state. A client certificate object returned by ne_ssl_clicert_read may be initially in either state,
depending on whether the file was encrypted or not.
ne_ssl_clicert_decrypt can be used to decrypt a client certificate using the appropriate password. This function must only be called if the
object is in the encrypted state; if decryption fails, the certificate state does not change, so decryption can be attempted more than once
using different passwords.
A client certificate can be given a "friendly name" when it is created; ne_ssl_clicert_name will return this name (or NULL if no friendly
name was specified). ne_ssl_clicert_name can be used when the client certificate is in either the encrypted or decrypted state, and will
return the same string for the lifetime of the object.
The function ne_ssl_clicert_owner returns the certificate part of the client certificate; it must only be called if the client certificate
is in the decrypted state.
When the client certificate is no longer needed, the ne_ssl_clicert_free function should be used to destroy the object.
RETURN VALUE
ne_ssl_clicert_read returns a client certificate object, or NULL if the file could not be read. ne_ssl_clicert_encrypted returns zero if
the object is in the decrypted state, or non-zero if it is in the encrypted state. ne_ssl_clicert_name returns a NUL-terminated friendly
name string, or NULL. ne_ssl_clicert_owner returns a certificate object.
EXAMPLES
The following code reads a client certificate and decrypts it if necessary, then loads it into an HTTP session.
ne_ssl_client_cert *ccert;
ccert = ne_ssl_clicert_read("/path/to/client.p12");
if (ccert == NULL) {
/* handle error... */
} else if (ne_ssl_clicert_encrypted(ccert)) {
char *password = prompt_for_password();
if (ne_ssl_clicert_decrypt(ccert, password)) {
/* could not decrypt! handle error... */
}
}
ne_ssl_set_clicert(sess, ccert);
SEE ALSO
ne_ssl_cert_read
AUTHOR
Joe Orton <neon@lists.manyfish.co.uk>
Author.
COPYRIGHT
neon 0.30.0 31 July 2013 NE_SSL_CLIENT_CERT(3)